1.
|
2017/10
|
Article
|
Applied Cryptography and Network Security - 15th International Conference, ACNS 2017 (Collaboration)
|
2.
|
2013/01
|
Article
|
Scalable Privacy-Preserving Data Mining with Asynchronously Partitioned Datasets IEICE Trans. on Fundamentals E-96A(1),pp.111-120 (Collaboration)
|
3.
|
2012/09
|
Article
|
Accuracy of Privacy-preserving Collaborative Filtering Based on Quasi-homomorphic Similarity 2012 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing (ATC 2012)IEEE, 2012 pp.555-562 (Collaboration)
|
4.
|
2012/09
|
Article
|
Word Salad CAPTCHA - Application and Evaluation of Synthesized Sentences 15th International Conference on Network-Based Information Systems (NBiS 2012),IEEE, 2012 pp.799-804 (Collaboration)
|
5.
|
2012/08
|
Article
|
Geographical Visualization of Malware Download for Anomaly Detection Seventh Asia Joint Conference on Information Security (AsiaJCIS 2012) IEEE pp.74-78 (Collaboration)
|
6.
|
2012/08
|
Article
|
Synthesis of Secure Passwords Seventh Asia Joint Conference on Information Security (AsiaJCIS 2012), IEEE, pp.35-37 (Collaboration)
|
7.
|
2012/07
|
Article
|
IFIP TM 2012参加報告 研究報告コンピュータセキュリティ(CSEC) 2012-CSEC-58(45),pp.1-6 (Collaboration)
|
8.
|
2012/07
|
Article
|
Privacy preserving collaborative filtering for SaaS enabling PaaS clouds Journal of Cloud Computing: Advances, Systems and Applications, Springer 1(8),pp.1-14 (Collaboration)
|
9.
|
2012/07
|
Article
|
Privacy-Preserving Collaborative Filtering using Randomized Response 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2012) pp.671-676 (Collaboration)
|
10.
|
2012/06
|
Article
|
Privacy-Preserving Collaborative Filtering Schemes With Sampling Users Journal of Japan Society for Fuzzy Theory and Intelligent Informatics 24(3),pp.753-762 (Collaboration)
|
11.
|
2012/05
|
Article
|
Perturbation Based Privacy Preserving Slope One Predictors for Collaborative Filtering Proc. of 6th IFIP WG 11.11 International Conference, IFIPTM 2012, Trust Management VI,Springer pp.17-35 (Collaboration)
|
12.
|
2011/11
|
Article
|
Analysis on the Sequential Behavior of Malware Attacks IEICE Trans. on Information and Systems E94-D(11),pp.2139-2149 (Collaboration)
|
13.
|
2011/11
|
Article
|
Efficient Privacy-Preserving Collaborative Filtering Based on the Weighted Slope One Predictor Journal of Internet Services and Information Security (JISIS) 1(4),pp.26-46 (Collaboration)
|
14.
|
2011/11
|
Article
|
Privacy-preserving collaborative filtering for the cloud 2011 IEEE Third International Conference on Cloud Computing Technology and Science (Cloudcom), IEEE pp.223-230 (Collaboration)
|
15.
|
2011/10
|
Article
|
Apriori-PrefixSpan Hybrid Approach for Automated Detection of Botnet Coordinated Attacks The 14th International Conference on Network-Based Information Systems (NBiS 2011), IEEE pp.92-97 (Collaboration)
|
16.
|
2011/10
|
Article
|
Improving Efficiency in Privacy-Preserving Automated Trust Negotiation with Conjunctive Policies 2011 14th International Conference on Network-Based Information Systems (NBiS), IEEE pp.679-684 (Collaboration)
|
17.
|
2011/10
|
Article
|
Time-zone dependency in malicious activities performed by botnet The 6th Joint Workshop on Information Security (JWIS 2011), No. 5D pp.1-14 (Collaboration)
|
18.
|
2011/09
|
Article
|
Perfect Privacy-preserving Automated Trust Negotiation Journal of Information Processing, IPSJ, (19),pp.451-462 (Collaboration)
|
19.
|
2011/09
|
Article
|
Principal Component Analysis of Botnet Takeover Journal of information processing, IPSJ, (19),pp.463-472 (Collaboration)
|
20.
|
2011/07
|
Article
|
Distributed Collaborative Filtering Protocol Based on Quasi-homomorphic Similarity 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, International Workshop on Advances in Information Security, IEEE pp.622-627 (Collaboration)
|
21.
|
2011/06
|
Article
|
Perfect Privacy Preserving in Automated Trust Negotiation 2011 IEEE International Conference on Advanced Information Networking and Applications (AINA), IEEE pp.129-134 (Collaboration)
|
22.
|
2011/06
|
Article
|
Privacy Preserving weighted Slope One predictor for Item-based Collaborative Filtering Proceedings of the International Workshop on Trust and Privacy in Distributed Information Processing (workshop at the IFIPTM 2011) pp.447-462 (Collaboration)
|
23.
|
2011/06
|
Article
|
Privacy-preserving weighted Slope One predictor for Item-based Collaborative Filtering Trust and Privacy in Distributed Information Processing (TP-DIS 2011), Workshop Proceedings of IFIPTM-2011(IFIP WG 11.11) pp.447-462 (Collaboration)
|
24.
|
2011/06
|
Article
|
Scalable Privacy-Preserving Data Mining with Asynchronously Partitioned Datasets Proceedings of the 26th IFIP Advances in Information and Communication Technology 2011 (IFIPSEC 2011), LNCS Springer (354),pp.223-234 (Collaboration)
|
25.
|
2010/10
|
Article
|
A discovery of sequential attack patterns of malware in botnets IEEE International Conference on Systems Man and Cybernetics (SMC) pp.2564-2570 (Collaboration)
|
26.
|
2010/10
|
Article
|
Improving Efficiency in Automated Trust Negotiation with Conjunctive Policies コンピュータセキュリティシンポジウム 2010 (CSS 2010), 3B2-1, 情報処理学会 pp.783-788 (Collaboration)
|
27.
|
2010/09
|
Article
|
Mining Association Rules Consisting of Download Servers from Distributed Honeypot Observation 13th International Conference on Network-Based Information Systems (NBiS),IEEE pp.541-545 (Collaboration)
|
28.
|
2010/09
|
Article
|
Principal Component Analysis of Port-scans for Reduction of Distributed Sensors Journal of Information Processing (JIP), IPSJ (18),pp.190-200 (Collaboration)
|
29.
|
2010/08
|
Article
|
Principal Component Analysis of Botnets Takeover The 5th Joint Workshop on Information Security (JWIS 2010), 4B-1 pp.1-11 (Collaboration)
|
30.
|
2010/04
|
Article
|
Privacy-Preserving Collaborative Filtering Protocol Based on Similarity between Items 24th IEEE International Conference on Advanced Information Networking and Applications (AINA) pp.573-578 (Collaboration)
|
31.
|
2010/03
|
Article
|
Frequent Sequential Attack Patterns of Malware in Botnets 情報処理学会,研究報告, Vol. 2010-CSEC-48 (37),pp.1-7 (Collaboration)
|
32.
|
2010/03
|
Article
|
Privacy-preserving similarity evaluation and application to remote biometrics authentication Soft Computing, Special Issue on Soft Computing in Decision Modeling 14(5),pp.529-536 (Collaboration)
|
33.
|
2010/02
|
Article
|
Heuristics for Detecting Botnet Coordinated Attacks International Conference on Availability, Reliability and Security (ARES 2010), WAIS 2010 pp.603-607 (Collaboration)
|
34.
|
2009/12
|
Article
|
A Study of User-Friendly Hash Comparison Schemes Computer Security Applications Conference (ACSAC 2009), IEEE pp.105-114 (Collaboration)
|
35.
|
2009/10
|
Article
|
A Proposal of Efficient Remote Biometric Authentication Protocol Advances in Information and Computer Security (IWSEC 2009), LNCS 5824, Springer pp.212-227 (Collaboration)
|
36.
|
2009/08
|
Article
|
A Storage Efficient Redactable Signature in the Standard Model Information Security Conference (ISC 2009), LNCS,Springer (5735),pp.326-337 (Collaboration)
|
37.
|
2009/08
|
Article
|
Orthogonal Expansion of Port-Scan-Estimation from Limited Sensors The Fourth Joint Workshop on Information Security (JWIS 2009), 5A-2 pp.1-14 (Collaboration)
|
38.
|
2009/08
|
Article
|
Orthogonal Expansion of Port-scanning Packets International Conference on Network-Based Information Systems (NBiS 2009),IEEE pp.321-326 (Collaboration)
|
39.
|
2009/03
|
Article
|
Privacy-Preserving Collaborative Filtering schemes International Conference on Availability, Reliability and Security (ARES 2009), WAIS 2009 IEEE pp.911-916 (Collaboration)
|
40.
|
2009/02
|
Article
|
Multiparty Computation from El Gamal/Paillier Conversion IEICE Transactions 92-A(1) pp.137-146 (Collaboration)
|
41.
|
2009/01
|
Article
|
Short Sanitizable Signature Scheme Based on RSA-Accumulators 暗号と情報セキュリティシンポジウム SCIS 2009, 3B2-3 pp.1-6 (Collaboration)
|
42.
|
2008/12
|
Article
|
Provable Secure Signature Scheme with Partial Sanitization and Disclosure Fourth International SKLOIS Conference, Inscrypt 2008, Pre-proceedings (2),pp.549-563 (Collaboration)
|
43.
|
2008/11
|
Article
|
Principal Components of Port-Address Matrices in Port-Scan Analysis On the Move to Meaningful Internet Systems: OTM 2008, LNCS 5332,Springer pp.956-968 (Collaboration)
|
44.
|
2008/11
|
Article
|
Privacy-Preserving Similarity Evaluation and Application to Remote Biometrics Authentication Modeling Decisions for Artificial Intelligence, LNCS 5285, Springer pp.3-14 (Collaboration)
|
45.
|
2008/10
|
Article
|
Remote Host Fingerprinting based on Clock Skew International Symposium on Communications and Information Technologies (ISCIT 2008),ISCIT 2008 pp.225-227 (Collaboration)
|
46.
|
2008/09
|
Article
|
Secure Multiparty Computation for Comparator Networks. IEICE Transactions 91-A(9) pp.2349-2355 (Collaboration)
|
47.
|
2008/08
|
Article
|
Automated Port-scan Classification with Decision Tree and Distributed Sensors Journal of Information Processing (16),pp.165-175 (Collaboration)
|
48.
|
2008/08
|
Article
|
Estimation of Increase of Scanners Based on ISDAS Distributed Sensors Journal of Information Processing (16),pp.100-109 (Collaboration)
|
49.
|
2008/05
|
Article
|
Multi-Bit Embedding in Asymmetirc Digital Watermarking without Exposing Secret Information IEICE Trans. Inf. & Syst. E91-D(5),pp.1348-1358 (Collaboration)
|
50.
|
2008/03
|
Article
|
Automated Classification of Port-Scans from Distributed Sensors 22nd IEEE International Conference on Advanced Information Networking and Applications (AINA 2008), IEEE pp.771-778 (Collaboration)
|
51.
|
2008/03
|
Article
|
Internet Observation with ISDAS: How long does a worm perform scanning? The 3rd International Conference on Availability, Reliability and Security (ARES 2008) pp.1282-1286 (Collaboration)
|
Display 5 items
|
Display all(51)
|